Find XSS payloads that actually work by filtering them based on real-world constraints instead of blind payload spraying.
☆143Mar 8, 2026Updated 2 weeks ago
Alternatives and similar repositories for XSSNow
Users that are interested in XSSNow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆49Jan 31, 2026Updated last month
- ☆29Jan 19, 2026Updated 2 months ago
- Browser-based Android security auditing tool.☆65Feb 6, 2026Updated last month
- WebSocket Penetration Testing Toolkit for Burp Suite☆29Mar 5, 2026Updated 2 weeks ago
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆17Feb 20, 2026Updated last month
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- Burp plugin for jxscout☆20May 12, 2025Updated 10 months ago
- a critical memory disclosure vulnerability in MongoDB's zlib compression handling. This tool allows security researchers to extract sensi…☆28Dec 27, 2025Updated 2 months ago
- ☆89Sep 13, 2025Updated 6 months ago
- Bug Bounty Setup Tools On Fresh VPS. This scripts automatically installs top bug bounty tools and set up environment in newly installed …☆31Jan 27, 2026Updated last month
- Droid LLM Hunter is a tool to scan for vulnerabilities in Android applications using Large Language Models (LLMs).☆91Feb 9, 2026Updated last month
- Meteorology reports and forecasts, satellite pass predictions, communications decoding, and imagery analysis for NOAA satellites 🌧 🛰 📡☆17Jul 30, 2023Updated 2 years ago
- Monitor your targets and hunt fresh assets in real time.☆158Feb 23, 2026Updated last month
- ☆38Nov 9, 2025Updated 4 months ago
- Burp Bounty Lab provides a safe, local target to validate that your Burp Bounty Pro scanner profiles detect vulnerabilities correctly. It…☆40Mar 16, 2026Updated last week
- Custom Trickest Workflows☆12Oct 26, 2023Updated 2 years ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆23Jun 22, 2021Updated 4 years ago
- WebRecon is an advanced Open Source Intelligence (OSINT) web reconnaissance tool designed for cybersecurity professionals, penetration te…☆258Updated this week
- A tool for analyzing syntactic and semantic properties of C Preprocessor macros in C programs☆12Aug 27, 2025Updated 6 months ago
- Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), …☆32Jan 11, 2026Updated 2 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆61Apr 13, 2025Updated 11 months ago
- ☆39May 4, 2025Updated 10 months ago
- ☆54Oct 13, 2025Updated 5 months ago
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆11May 12, 2022Updated 3 years ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 8 months ago
- This project aims to provide a comprehensive resource for understanding and testing Cross-Site Scripting (XSS) vulnerabilities, one of th…☆49Jan 10, 2026Updated 2 months ago
- poc for CVE-2025-14847☆24Dec 26, 2025Updated 2 months ago
- SSLPinDetect is a tool for analyzing Android APKs to detect SSL pinning implementations by scanning for known patterns in decompiled code…☆82Sep 5, 2025Updated 6 months ago
- DursGo - The Go-Powered Web Application Scanner - With AI-Powered Analysis☆62Mar 8, 2026Updated 2 weeks ago
- ☆276Dec 6, 2025Updated 3 months ago
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 4 months ago
- Remotely block the wifi users connection without the admin privilege.☆27Jan 13, 2026Updated 2 months ago
- VulScanner - is a powerful, multi-faceted tool designed for security professionals, developers, and penetration testers to perform automa…☆36Jul 29, 2025Updated 7 months ago
- CVE-2025-56383-Proof-of-Concept☆54Sep 26, 2025Updated 5 months ago
- Perform with Massive Command Injection (Chamilo)☆23Jul 31, 2023Updated 2 years ago
- Fork repository for CryptoCat's "Binary Exploitation 101 Course" AKA "Practical Buffer Overflow Exploitation"☆23Dec 9, 2022Updated 3 years ago
- ☆13Apr 6, 2022Updated 3 years ago
- Subdomain Enumerator and Simple Crawler☆354Feb 12, 2026Updated last month
- Simple web app to track OWASP WSTG security testing progress☆27Sep 12, 2025Updated 6 months ago